Sciweavers

2236 search results - page 74 / 448
» Intrusion detection techniques and approaches
Sort
View
WSE
2006
IEEE
15 years 3 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
IWAN
2004
Springer
15 years 3 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
SE
2007
14 years 11 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
JCS
2006
81views more  JCS 2006»
14 years 10 months ago
Effective worm detection for various scan techniques
In recent years, the threats and damages caused by active worms have become more and more serious. In order to reduce the loss caused by fastspreading active worms, an effective de...
Jianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao, ...
ICAPR
2009
Springer
15 years 4 months ago
A Skin-Color and Template Based Technique for Automatic Ear Detection
This paper proposes an efficient skin-color and template based technique for automatic ear detection in a side face image. The technique first separates skin regions from nonski...
Surya Prakash, Umarani Jayaraman, Phalguni Gupta